CN110213300A - A kind of intelligence edge Internet of Things agent apparatus - Google Patents
A kind of intelligence edge Internet of Things agent apparatus Download PDFInfo
- Publication number
- CN110213300A CN110213300A CN201910615042.9A CN201910615042A CN110213300A CN 110213300 A CN110213300 A CN 110213300A CN 201910615042 A CN201910615042 A CN 201910615042A CN 110213300 A CN110213300 A CN 110213300A
- Authority
- CN
- China
- Prior art keywords
- internet
- things
- mpk
- sensor
- agent apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C19/00—Electric signal transmission systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application involves intelligent edge Internet of Things agent apparatus characterized by comprising Internet of Things communication module accesses perception control system by Internet of Things for downlink;Local area network communications module is connected to basic service system, resource exchange system, O&M managing and control system by local area network for uplink;Local area network communications module, for connecting custom system by communication network.The present invention realize can intelligently various perception datas of collection in worksite, to realize unmanned automation power grid fortune inspection.
Description
Technical field
This application involves electrical equipment technical field more particularly to a kind of intelligent edge Internet of Things agent apparatus.
Background technique
Fig. 1 is the schematic diagram of electric power internet of things concept model, as shown, electric power internet of things concept model by user domain,
Target object domain, perception control domain, service provide domain, O&M control domain and Resource Exchange domain composition.Wherein, perception control domain is
The entity sets of the software and hardware system of all kinds of acquisition perceptive object information and manipulation control object.Perception control domain, which can be realized, to be directed to
Localization perception, collaboration and the manipulation of physical world object, and the excuse of long-range management and service is provided for other domains.Perception control
Domain system processed typically comprises sensor network system, label recognition system, location information system, audio/video information acquisition system
The entities such as system, intelligent equipment interface system.
Internet of Things agency in edge is that support perception control system and other systems interconnect, and realize perception control domain local management
Entity.Internet of Things agency in edge can provide protocol conversion, address of cache, data processing, information fusion, safety certification, equipment pipe
The functions such as reason.From device definition angle, edge Internet of Things act on behalf of the equipment that can be autonomous working, can also control with other perception
Integration of equipments is a function device.
Power grid fortune inspection is the work extremely taken time and effort, such as the oil chromatography detection of power transformation device, generally requires manually to carry out
Chemical examination detection is sampled and takes back, not only time-consuming but also consumption manpower may just compare late until detecting that result is intervened again.
After internet of things sensors puts into operation, power transformation station equipment can be monitored at any time, data to edge Internet of Things are uploaded in time and act on behalf of
It is analyzed, once discovery goes wrong, just can be handled at the first time.A kind of intelligent edge Internet of Things of this field urgent need
Agent apparatus, can intelligently various perception datas of collection in worksite, to realize unmanned automation power grid fortune inspection.
Summary of the invention
To overcome the problems in correlation technique, the application provides a kind of intelligent edge Internet of Things agent apparatus.
According to the embodiment of the present application, a kind of intelligent edge Internet of Things agent apparatus is provided characterized by comprising
Internet of Things communication module accesses perception control system by Internet of Things for downlink;
Local area network communications module is connected to basic service system, resource exchange system, O&M pipe by local area network for uplink
Control system;
Local area network communications module, for connecting custom system by communication network.
Preferably, further include encrypting module, be used in Internet of Things and local area network encrypted transmission information in linkage.
Preferably, Internet of Things communication module downlink by Internet of Things access perception control system in sensor network node,
Label read-write apparatus, audio & video equipment, intelligent equipment and location information system.
Preferably, encrypted transmission includes encrypting module in linkage in Internet of Things and local area network:
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0For in Internet of Things online broadcast.
Preferably, further includes:
Each sensor negotiates the basic point G of creation elliptic curve E;
The Internet of Things communication module obtains G.
Preferably, further includes:
Sensor i creates respective key ki;
Calculate respective public key MPKi=ki·G;
The Internet of Things communication module obtains MPK from Internet of Thingsi。
Preferably, by MPKiEncrypted transmission includes: to Internet of Things communication module
The encrypting module generates Your Majesty's key mpk using key algorithmiWith master key mski;
By Your Majesty's key mpkiSensor i is sent to by Internet of Things;
Sensor i is calculatedWherein, | | to press or operator,For exclusive or
Operation, IDiFor the ID of sensor i.
Preferably, further includes:
The information that be sent to sensor i that the encrypting module receives the local area network communications module from telenet
With its IDiConstitute message MRi;
By MPKiDecryption reduction;
Using the MPK of reductioniBy MRiEncryption obtains Ei。
Preferably, by MPKiDecryption restores
The encrypting module uses master key mskiWith its IDiGenerate key ski;
Using Your Majesty's key mskiWith key skiTo the MPK from the sensoriThe MPK restored is decryptediWith
And ID';
If ID'=IDi, then confirm the MPK that decryption obtainsiIt is true.
Preferably, using the MPK of reductioniBy MRiEncryption obtains EiInclude:
The encrypting module chooses random number ri, MRiWith the MPK of reductioniSum be encoded to the point on elliptic curve
Calculate C1i=riG;
It calculates
Construct Ei=(C1i, C2i)。
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0Include:
The encrypting module calculates
Decoding obtains
Obtain addition polymerization result
The present invention realize can intelligently various perception datas of collection in worksite, to realize unmanned automation power grid fortune
Inspection.
The additional aspect of the application and advantage will be set forth in part in the description, and will partially become from the following description
It obtains obviously, or recognized by the practice of the application.It should be understood that above general description and following detailed description are only
Be it is exemplary and explanatory, the application can not be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the schematic diagram of electric power internet of things concept model;
Fig. 2 is intelligent edge Internet of Things in a kind of electric power Internet of things system reference hierarchy framework shown in an exemplary embodiment
The schematic diagram of agent apparatus;
Fig. 3 is the schematic diagram of the intelligent edge Internet of Things agent apparatus communication references system of Fig. 2.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Following disclosure provides many different embodiments or example is used to realize the different structure of the application.For letter
Change disclosure herein, hereinafter the component of specific examples and setting are described.Certainly, they are merely examples, and
Purpose does not lie in limitation the application.In addition, the application can in different examples repeat reference numerals and/or letter.It is this heavy
It is that for purposes of simplicity and clarity, itself is more than the relationship discussed between various embodiments and/or setting again.This
Outside, this application provides various specific techniques and material example, but those of ordinary skill in the art may be aware that
The use of the applicability and/or other materials of other techniques.In addition, fisrt feature described below is in Second Eigenvalue "upper"
Structure may include embodiment that the first and second features are formed as directly contacting, also may include that other feature is formed in
Embodiment between first and second features, such first and second feature may not be direct contact.
In the description of the present application, it should be noted that unless otherwise specified and limited, term " installation ", " connected ",
" connection " shall be understood in a broad sense, for example, it may be mechanical connection or electrical connection, the connection being also possible to inside two elements can
, can also indirectly connected through an intermediary, for the ordinary skill in the art to be to be connected directly, it can basis
Concrete condition understands the concrete meaning of above-mentioned term.
Fig. 2 is intelligent edge Internet of Things in a kind of electric power Internet of things system reference hierarchy framework shown in an exemplary embodiment
The schematic diagram of agent apparatus, as shown, intelligent edge Internet of Things agent apparatus of the invention includes:
Internet of Things communication module accesses perception control system by Internet of Things for downlink;
Local area network communications module is connected to basic service system, resource exchange system, O&M pipe by local area network for uplink
Control system;
Local area network communications module, for connecting custom system by communication network, specifically, mobile communication can be passed through
The various modes such as network, access in radio private network, satellite spatial communication are linked into custom system, and custom system can be mobile communication
Terminal or various forms of computer terminals.
Industrial Internet of Things is intended to promote traditional industry to networking, intelligentized new stage, application have real-time,
The features such as open, principle are that different equipment machine is networked, and obtain set respectively by sensor thereon or controller
Standby work condition state or environmental information, analysis optimization equipment work efficiency energy consumption carry out equipment management and feedback control.
Intelligent edge Internet of Things agent apparatus of the invention by industrial Internet of Things realize can intelligently collection in worksite it is each
Kind perception data, and basic service system, resource exchange system, O&M managing and control system are connected to by conventional local area network, pass through
Communication network connects custom system, therefore user can remotely know that intelligent edge Internet of Things act on behalf of such as change collected from Internet of Things
Various perception datas in power station, and scheduled basis service system, resource exchange system, O&M managing and control system carry out various controls
System, various automation control logics can also be carried in basic service system, issue switch in time automatically according to perception data
Intelligent edge Internet of Things agent apparatus is given in the instruction of movement, and intelligent edge Internet of Things agent apparatus then passes through Internet of Things and goes control switch
Movement, to realize unmanned automation power grid fortune inspection.
Preferably, further include encrypting module, be used in Internet of Things and local area network encrypted transmission information in linkage.
Internet of Things, because economic value is more and more great, is also faced with many peaces while realizing more applications
It is complete to threaten.Intelligent edge Internet of Things agent apparatus, which undertakes, accesses edge net for switches various in substation and sensor network node etc.
Important function be particularly susceptible to various network attacks and threaten because to be directly connected to telecommunications network.This is excellent
It selects embodiment by addition encrypting module, realizes safer Internet of Things edge access, so that it is guaranteed that substation safety is run,
Not by extraneous illegal invasion.
Fig. 3 is the schematic diagram of the intelligent edge Internet of Things agent apparatus communication references system of Fig. 2, and Internet of Things communication module downlink is logical
Cross sensor network node, the label read-write apparatus, audio & video equipment, intelligent equipment in Internet of Things access perception control system
And location information system.
Preferably, encrypted transmission includes encrypting module in linkage in Internet of Things and local area network:
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0For in Internet of Things online broadcast.
For example, n sensor can be deployed in including crusing robot, infrared camera, the monitoring of casing dielectric loss, wireless temperature
Spend monitoring, partial discharge monitoring, accumulator monitoring etc..
Preferably, further includes:
Each sensor negotiates the basic point G of creation elliptic curve E;
The Internet of Things communication module obtains G.
The present apparatus uses elliptic curve ECC Encryption Algorithm in Internet of Things, and safety is stronger, and calculation amount is lighter.
Preferably, further includes:
Sensor i creates respective key ki;
Calculate respective public key MPKi=ki·G;
The Internet of Things communication module obtains MPK from Internet of Thingsi。
The key of multiple sensors is produced certain relevance by this preferred embodiment, unified to carry out encryption handling, because
The various scenes such as this multiple sensors especially suitable for substation so that more sensors are encrypted jointly, so as to point
Booth calculates pressure, further improves security performance.
Previous equipment on-line monitoring existence perception not comprehensively, element power consumption is high, integrated level is low, is not easy to extend etc. lacks
Point.Used in an on-the-spot test of the invention, ubiquitous electric power Internet of Things to minimize, low-power consumption, high integration and highly reliable
Property be target, deployment video, temperature and humidity, partial discharge, 65 sets of induction elements such as Intellisenses element and crusing robot such as vibration
Deployment, the key of multiple sensors produces certain relevance, unified to carry out encryption handling, to realize transformer, group
Close electrical, switchgear and auxiliary equipment apparatus body and ambient condition comprehensive depth perception, be the operation management of power grid wisdom and
Comprehensive energy efficiency evaluation is laid a solid foundation.
Preferably, by MPKiEncrypted transmission includes: to Internet of Things communication module
The encrypting module generates Your Majesty's key mpk using key algorithmiWith master key mski;
By Your Majesty's key mpkiSensor i is sent to by Internet of Things;
Sensor i is calculatedWherein, | | to press or operator,For exclusive or
Operation, IDiFor the ID of sensor i.
The Encryption Algorithm calculation amount of this preferred embodiment is low, and has good concealment.This preferred embodiment is by kiEncryption
After be transmitted to each sensor, therefore further improve safety.In addition, this preferred embodiment joined biography in ciphering process
The identity information ID of sensori, to carry out equipment identification when facilitating a large amount of similar devices networkings in Internet of Things, and further mention
The high safety of encryption.
Preferably, further includes:
The information that be sent to sensor i that the encrypting module receives the local area network communications module from telenet
With its IDiConstitute message MRi;
By MPKiDecryption reduction;
Using the MPK of reductioniBy MRiEncryption obtains Ei。
Preferably, by MPKiDecryption restores
The encrypting module uses master key mskiWith its IDiGenerate key ski;
Using Your Majesty's key mskiWith key skiTo the MPK from the sensoriThe MPK restored is decryptediWith
And ID';
If ID'=IDi, then confirm the MPK that decryption obtainsiIt is true.
Because of kiIn joined the identity information ID of sensori, therefore by kiAfter decryption, ID can be therefrom extractedi, and sentence
It is disconnected whether consistent with the ID of oneself, if unanimously, assert the k of decryptioniIt is very, which further improves the safeties of encryption.
Preferably, using the MPK of reductioniBy MRiEncryption obtains EiInclude:
The encrypting module chooses random number ri, MRiWith the MPK of reductioniSum be encoded to the point on elliptic curve
Calculate C1i=riG;
It calculates
Construct Ei=(C1i, C2i)。
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0Include:
The encrypting module calculates
Decoding obtains
Obtain addition polymerization result
This preferred embodiment has received intelligent edge Internet of Things agent apparatus safely from Internet of Things from each sensing
The ciphertext of device, and realize by polymerizeing the combination of all the sensors ciphertext, thus big on intelligent edge Internet of Things agent apparatus
Width enhances safety, and then while being transmitted in local area network can resist very severe malicious attack.
It is worth noting that, intelligent edge Internet of Things agent apparatus can only be using the plaintext that private key is polymerize as a result, but not
It can decrypt to obtain the clear data of each node using private key, therefore even if intelligent edge Internet of Things agent apparatus itself is insincere
Appoint, but not lead to serious data leak, to improve safety.
Preferably, carrying out transmission after in Internet of Things connection by data encryption can also include:
Sensor generates random noise data;
By certain algorithm by random noise data and the data E to be transmittediIt is mixed;
Mixed data are transmitted and received by Internet of Things;
Intelligent edge Internet of Things agent apparatus extracts the data to be transmitted according to certain algorithm from mixed data.
Preferably, it includes: to generate random noise data using random number generating functon that sensor, which generates random noise data,.
Preferably, generating random noise data using random number generating functon includes: the current reading using the sensor
The seed as random number generating functon is counted to generate random noise data.
The current reading of sensor is clearly completely random, generates random noise number using the random number as seed
According to thoroughly prevent a possibility that external world cracks.
In addition, because directlying adopt the current internal reading of sensor, (such as sensor is accumulator monitoring, then using electricity
Pressure reading, is wireless temperature monitoring, then uses temperature sensitive reading), it is clear that data source is easier, and can mitigate calculating
Amount.
Preferably, last three digit currently read can be intercepted.Which in turns increases the concealments of random number.
Preferably, if there is muti-piece sensor, then multiple current readings of generation are subjected to initialization process, obtained final
Random number, this makes outside invading person be more difficult to predict this random number.
Preferably, the current reading of the sensor is used to generate random noise as the seed of random number generating functon
Data include:
Obtain the reading a of g Fee Schedulei, wherein i is 1-g;
Seed s=a is set1⊕a2⊕…⊕ag, wherein ⊕ is XOR operation;
Random noise data R is generated by the seed of random number generating functon of s.
This embodiment gives the preferred embodiments of initialization process, and XOR operation only takes up seldom computing resource,
Will not many battery powers and processing capacity, this is for changing battery cycle especially effect using the extension sensor of small Electronic power batteries
Significantly.
For the sensor of comparision of quantity of electricity abundance, such as accumulator monitoring, more complicated operation can be executed to encrypt kind
Son, specific as follows:
Setting
Wherein, aminFor aiIn minimum value, amaxFor aiIn maximum value.
This preferred embodiment has created a kind of seed encrypted algorithm, so that security of system is substantially strengthened, by a large amount of
Emulation practice, confirms that the Encryption Algorithm has very strong robustness, it is difficult to maliciously be cracked.
Preferably, generating random noise data R as the seed of random number generating functon using s includes:
R1=[random (s)];
R2=[random (s+1)];
R3=[random (s+2)];
R=(R1,R2,R3);
Wherein random () is random number generating functon, and [] is rounding operation.Random function random () can use city
Various normal functions on field, it is important to which seed of the invention has very strong concealment, to ensure that safety.
Preferably, random noise data mix with the data to be transmitted by certain algorithm include:
It is as follows that model is set:
ε=CTxi
Mixed data are setWherein:
Xi=([xi×R1]mod N)
Yi=([yj×R2]mod M)
Zi=([zk×R3]mod 256)
In formula, 0 < x01,0 < y of <01,0 < z of <01,3.77 < γ < of <, 4.0,0 < β <, 0.15,0 < α < 0.03,0
< δ < 0.03, Xi, Yi, ZiFor matrix X, i-th of element of Y, Z, M, N are the line number and columns for the data A to be transmitted, x0, y0,
z0For the 3D key seed generated at random, xi, yj, zkFor 3D chaos system output x, y, the random sequence in the direction z, 0 < i < N, 0
< j < M, 0 < k < M × N,C is that system time proofreads Separation control matrix, and ε is time check control amount.
Preferably, the Internet of Things uses PLC (Power Line Carrier, power line carrier communication), FSK (micro- function
Rate wireless communication), RS485, M-BUS (Meter-Bus), zigbee (purple honeybee), at least one of LoRa and NB-IoT.
This preferred embodiment supports the Internet of Things of mainstream currently on the market, so that the technical program obtains as far as possible
It promotes and applies.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the application
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.
Claims (10)
1. a kind of intelligence edge Internet of Things agent apparatus characterized by comprising
Internet of Things communication module accesses perception control system by Internet of Things for downlink;
Local area network communications module is connected to basic service system, resource exchange system, O&M control system by local area network for uplink
System;
Local area network communications module, for connecting custom system by communication network.
2. intelligence edge according to claim 1 Internet of Things agent apparatus, which is characterized in that further include encrypting module, be used for
The encrypted transmission information in linkage in Internet of Things and local area network.
3. intelligence edge according to claim 2 Internet of Things agent apparatus, which is characterized in that Internet of Things communication module downlink passes through
Internet of Things access perception control system in sensor network node, label read-write apparatus, audio & video equipment, intelligent equipment and
Location information system.
4. intelligence edge according to claim 3 Internet of Things agent apparatus, which is characterized in that encrypting module is in Internet of Things drawn game
Encrypted transmission includes in linkage in the net of domain:
The ciphertext E of n sensor will be sent to1, E2, E3... EnIt polymerize and encrypts to obtain E0For in Internet of Things online broadcast.
5. intelligence edge according to claim 4 Internet of Things agent apparatus, which is characterized in that further include:
Each sensor negotiates the basic point G of creation elliptic curve E;
The Internet of Things communication module obtains G.
6. intelligence edge according to claim 5 Internet of Things agent apparatus, which is characterized in that further include:
Sensor i creates respective key ki;
Calculate respective public key MPKi=ki·G;
The Internet of Things communication module obtains MPK from Internet of Thingsi。
7. intelligence edge according to claim 6 Internet of Things agent apparatus, which is characterized in that by MPKiEncrypted transmission is to Internet of Things
Network Communication module includes:
The encrypting module generates Your Majesty's key mpk using key algorithmiWith master key mski;
By Your Majesty's key mpkiSensor i is sent to by Internet of Things;
Sensor i is calculatedWherein, | | to press or operator,For XOR operation,
IDiFor the ID of sensor i.
8. intelligence edge according to claim 7 Internet of Things agent apparatus, which is characterized in that further include:
The information that be sent to sensor i that the encrypting module receives the local area network communications module from telenet and its
IDiConstitute message MRi;
By MPKiDecryption reduction;
Using the MPK of reductioniBy MRiEncryption obtains Ei。
9. intelligence edge according to claim 8 Internet of Things agent apparatus, which is characterized in that by MPKiDecryption restores
The encrypting module uses master key mskiWith its IDiGenerate key ski;
Using Your Majesty's key mskiWith key skiTo the MPK from the sensoriThe MPK restored is decryptediAnd ID ';
If ID '=IDi, then confirm the MPK that decryption obtainsiIt is true.
10. intelligence edge according to claim 9 Internet of Things agent apparatus, which is characterized in that using the MPK of reductioniBy MRi
Encryption obtains Ei and includes:
The encrypting module chooses random number ri, MRiWith the MPK of reductioniSum be encoded to the point on elliptic curve
Calculate C1i=riG;
It calculates
Construct Ei=(C1i, C2i)。
The ciphertext E of n sensor will be sent to1, E2, E3... EnIt polymerize and encrypts to obtain E0Include:
The encrypting module calculates
Decoding obtains
Obtain addition polymerization result
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910615042.9A CN110213300A (en) | 2019-07-09 | 2019-07-09 | A kind of intelligence edge Internet of Things agent apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910615042.9A CN110213300A (en) | 2019-07-09 | 2019-07-09 | A kind of intelligence edge Internet of Things agent apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110213300A true CN110213300A (en) | 2019-09-06 |
Family
ID=67796846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910615042.9A Pending CN110213300A (en) | 2019-07-09 | 2019-07-09 | A kind of intelligence edge Internet of Things agent apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110213300A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111682640A (en) * | 2020-04-20 | 2020-09-18 | 国网浙江桐乡市供电有限公司 | Full-sensing monitoring and operation and maintenance system for power distribution room |
CN111682639A (en) * | 2020-04-20 | 2020-09-18 | 国网浙江桐乡市供电有限公司 | Power distribution room full-perception monitoring operation and maintenance system and method based on wireless multi-hop network |
CN111740493A (en) * | 2020-06-02 | 2020-10-02 | 国网河北省电力有限公司邯郸供电分公司 | Power switch cabinet state monitoring system based on internet of things technology |
CN111784130A (en) * | 2020-06-19 | 2020-10-16 | 国电南瑞南京控制系统有限公司 | Power distribution network Internet of things management system, data processing method and storage medium |
CN117129133A (en) * | 2023-10-27 | 2023-11-28 | 南京中鑫智电科技有限公司 | Online monitoring method and system for high-voltage casing pressure |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2013100351A4 (en) * | 2013-03-22 | 2013-05-02 | Huang, Xu PROF | An Apparatus and Method based on dynamic window fuzzy controller for Scalar Multiplication in Elliptic Curve Cryptography on Wireless Sensor Platform |
CN103581175A (en) * | 2013-10-17 | 2014-02-12 | 江苏科技大学 | Safe data aggregation method |
CN109873815A (en) * | 2019-01-28 | 2019-06-11 | 西安电子科技大学 | Isomeric compound networking certification method based on edge calculations, Internet of Things security platform |
-
2019
- 2019-07-09 CN CN201910615042.9A patent/CN110213300A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2013100351A4 (en) * | 2013-03-22 | 2013-05-02 | Huang, Xu PROF | An Apparatus and Method based on dynamic window fuzzy controller for Scalar Multiplication in Elliptic Curve Cryptography on Wireless Sensor Platform |
CN103581175A (en) * | 2013-10-17 | 2014-02-12 | 江苏科技大学 | Safe data aggregation method |
CN109873815A (en) * | 2019-01-28 | 2019-06-11 | 西安电子科技大学 | Isomeric compound networking certification method based on edge calculations, Internet of Things security platform |
Non-Patent Citations (2)
Title |
---|
沈杰: "物联网参考体系结构标准及应用", 《信息技术与标准化》 * |
钱萍: "无线传感器网络隐私保护方法", 《电信科学》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111682640A (en) * | 2020-04-20 | 2020-09-18 | 国网浙江桐乡市供电有限公司 | Full-sensing monitoring and operation and maintenance system for power distribution room |
CN111682639A (en) * | 2020-04-20 | 2020-09-18 | 国网浙江桐乡市供电有限公司 | Power distribution room full-perception monitoring operation and maintenance system and method based on wireless multi-hop network |
CN111740493A (en) * | 2020-06-02 | 2020-10-02 | 国网河北省电力有限公司邯郸供电分公司 | Power switch cabinet state monitoring system based on internet of things technology |
CN111784130A (en) * | 2020-06-19 | 2020-10-16 | 国电南瑞南京控制系统有限公司 | Power distribution network Internet of things management system, data processing method and storage medium |
CN117129133A (en) * | 2023-10-27 | 2023-11-28 | 南京中鑫智电科技有限公司 | Online monitoring method and system for high-voltage casing pressure |
CN117129133B (en) * | 2023-10-27 | 2024-01-02 | 南京中鑫智电科技有限公司 | Online monitoring method and system for high-voltage casing pressure |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110213300A (en) | A kind of intelligence edge Internet of Things agent apparatus | |
Bedi et al. | Review of Internet of Things (IoT) in electric power and energy systems | |
Chin et al. | Energy big data security threats in IoT-based smart grid communications | |
Kayastha et al. | Smart grid sensor data collection, communication, and networking: a tutorial | |
Davoody-Beni et al. | Application of IoT in smart grid: Challenges and solutions | |
CN107333265A (en) | A kind of zigbee equipment method of network entry | |
Rana et al. | IoT‐based cyber‐physical communication architecture: challenges and research directions | |
Sedrati et al. | A survey of security challenges in internet of things | |
Jain et al. | SCADA security: a review and enhancement for DNP3 based systems | |
CN213718230U (en) | Safety certification device | |
CN111935168A (en) | Industrial information physical system-oriented intrusion detection model establishing method | |
Albany et al. | A review: Secure internet of thing system for smart houses | |
Chen et al. | WiFi-Based home IoT communication system | |
Ramadan | Internet of things (iot) security vulnerabilities: A review | |
Chalamasetty et al. | Secure SCADA communication network for detecting and preventing cyber-attacks on power systems | |
CN110300183A (en) | A kind of intelligence edge Internet of Things agent apparatus | |
Kumar et al. | Device fingerprinting for cyber-physical systems: a survey | |
Bohani et al. | Microgrid Communication and Security: State-Of-The-Art and Future Directions | |
Kuzlu et al. | Internet‐based communication platform for residential DR programmes | |
Kim | Analyses of secure authentication scheme for smart home system based on internet on things | |
Nagamalla et al. | Notice of Violation of IEEE Publication Principles: A review of security frameworks for Internet of Things | |
Chae et al. | Industrial control systems vulnerabilities and security issues and future enhancements | |
Kiarie et al. | Application of spritz encryption in smart meters to protect consumer data | |
CN110233795A (en) | A kind of edge gateway of internet of things of encryption | |
Zhang et al. | Nonintrusive load management based on distributed edge and secure key agreement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190906 |